Network security through data analysis from data to action
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media
2017
|
Ausgabe: | Second edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047618051 | ||
003 | DE-627-1 | ||
005 | 20240228120333.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9781491962817 |9 978-1-4919-6281-7 | ||
020 | |a 149196281X |9 1-4919-6281-X | ||
020 | |a 9781491962794 |9 978-1-4919-6279-4 | ||
020 | |a 1491962798 |9 1-4919-6279-8 | ||
020 | |a 1491962836 |9 1-4919-6283-6 | ||
020 | |a 9781491962831 |9 978-1-4919-6283-1 | ||
035 | |a (DE-627-1)047618051 | ||
035 | |a (DE-599)KEP047618051 | ||
035 | |a (ORHE)9781491962831 | ||
035 | |a (DE-627-1)047618051 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Collins, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Network security through data analysis |b from data to action |c Michael Collins |
250 | |a Second edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c 2017 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Previous edition published: 2014. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 18, 2017) | ||
520 | |a Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Communication |x Network analysis | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Communication ; Analyse de réseau | |
650 | 4 | |a COMPUTERS ; Security ; Networking | |
650 | 4 | |a Communication ; Network analysis | |
650 | 4 | |a Computer networks ; Security measures | |
776 | 1 | |z 1491962844 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1491962844 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781491962831/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047618051 |
---|---|
_version_ | 1818767306527866880 |
adam_text | |
any_adam_object | |
author | Collins, Michael |
author_facet | Collins, Michael |
author_role | aut |
author_sort | Collins, Michael |
author_variant | m c mc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047618051 (DE-599)KEP047618051 (ORHE)9781491962831 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03353cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-047618051</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120333.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491962817</subfield><subfield code="9">978-1-4919-6281-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">149196281X</subfield><subfield code="9">1-4919-6281-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491962794</subfield><subfield code="9">978-1-4919-6279-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491962798</subfield><subfield code="9">1-4919-6279-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491962836</subfield><subfield code="9">1-4919-6283-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491962831</subfield><subfield code="9">978-1-4919-6283-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047618051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047618051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781491962831</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047618051</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Collins, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security through data analysis</subfield><subfield code="b">from data to action</subfield><subfield code="c">Michael Collins</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition published: 2014. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 18, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Communication</subfield><subfield code="x">Network analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication ; Analyse de réseau</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication ; Network analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1491962844</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1491962844</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781491962831/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047618051 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:47Z |
institution | BVB |
isbn | 9781491962817 149196281X 9781491962794 1491962798 1491962836 9781491962831 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Collins, Michael VerfasserIn aut Network security through data analysis from data to action Michael Collins Second edition. Sebastopol, CA O'Reilly Media 2017 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Previous edition published: 2014. - Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed September 18, 2017) Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You'll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques. Computer networks Security measures Communication Network analysis Réseaux d'ordinateurs ; Sécurité ; Mesures Communication ; Analyse de réseau COMPUTERS ; Security ; Networking Communication ; Network analysis Computer networks ; Security measures 1491962844 Erscheint auch als Druck-Ausgabe 1491962844 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781491962831/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Collins, Michael Network security through data analysis from data to action Computer networks Security measures Communication Network analysis Réseaux d'ordinateurs ; Sécurité ; Mesures Communication ; Analyse de réseau COMPUTERS ; Security ; Networking Communication ; Network analysis Computer networks ; Security measures |
title | Network security through data analysis from data to action |
title_auth | Network security through data analysis from data to action |
title_exact_search | Network security through data analysis from data to action |
title_full | Network security through data analysis from data to action Michael Collins |
title_fullStr | Network security through data analysis from data to action Michael Collins |
title_full_unstemmed | Network security through data analysis from data to action Michael Collins |
title_short | Network security through data analysis |
title_sort | network security through data analysis from data to action |
title_sub | from data to action |
topic | Computer networks Security measures Communication Network analysis Réseaux d'ordinateurs ; Sécurité ; Mesures Communication ; Analyse de réseau COMPUTERS ; Security ; Networking Communication ; Network analysis Computer networks ; Security measures |
topic_facet | Computer networks Security measures Communication Network analysis Réseaux d'ordinateurs ; Sécurité ; Mesures Communication ; Analyse de réseau COMPUTERS ; Security ; Networking Communication ; Network analysis Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781491962831/?ar |
work_keys_str_mv | AT collinsmichael networksecuritythroughdataanalysisfromdatatoaction |